Android Forensics and Security Testing
Exploits 2: Exploitation in the Windows Environment
Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration
Introduction to Software Exploits
Introduction to Software Reverse Engineering
Introduction to Trusted Computing
Introduction to Vulnerability Assessment
Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
Reverse Engineering Malware
Rootkits: What They Are, and How to Find Them
The Life of Binaries